skip to main content
Skip header Section
Mobile agentsSeptember 1997
Publisher:
  • Manning Publications Co.
  • 3 Lewis Street Greenwich, CT
  • United States
ISBN:978-0-13-858242-5
Published:20 September 1997
Pages:
320
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Prem M and Swamynathan S Efficient dynamic itinerary and memory allocation for mobile agents Proceedings of the International Conference on Advances in Computing, Communications and Informatics, (409-415)
  2. Bojic I, Podobnik V and Kusek M Agent-enabled collaborative downloading Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part II, (62-71)
  3. Georgiades A, Luo Y, Lasebae A and Comley R Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents Proceedings of the 8th WSEAS international conference on Electronics, hardware, wireless and optical communication, (51-56)
  4. Daknou A, Zgaya H, Hammadi S and Hubert H Toward a multi-agent model for the care of patients at the emergency department Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems, (264-269)
  5. Jurasovic K, Jezic G and Kusek M Using BDI agents for automated software deployment in next generation networks Proceedings of the 11th IASTED International Conference on Software Engineering and Applications, (423-428)
  6. Kim S and Robertazzi T (2006). Modeling mobile agent behavior, Computers & Mathematics with Applications, 51:6-7, (951-966), Online publication date: 1-Mar-2006.
  7. Kamangar F, Levine D, Záruba G and Thomas R (2005). Mobile agent connection establishment and management (CEMA), The Journal of Supercomputing, 31:1, (79-99), Online publication date: 1-Jan-2005.
  8. Lee H, Alves-Foss J and Harrison S (2004). The construction of secure mobile agents via evaluating encrypted functions, Web Intelligence and Agent Systems, 2:1, (1-19), Online publication date: 1-Jan-2004.
  9. ACM
    Du T, Li E and Chang A (2003). Mobile agents in distributed network management, Communications of the ACM, 46:7, (127-132), Online publication date: 1-Jul-2003.
  10. Patel R and Garg K A new paradigm for mobile agent computing Proceedings of the 2nd WSEAS International Conference on Electronics, Control and Signal Processing, (1-8)
  11. Cost Effective Mobile Agent Planning for Distributed Information Retrieval Proceedings of the The 21st International Conference on Distributed Computing Systems
  12. Carchiolo V, Malgeri M and Mangioni G Implementing a Distributed Server Using Mobile Agent Technology Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Contributors
  • Naval Postgraduate School
  • University of Southern California

Recommendations

Reviews

H. Van Dyke Parunak

One of the most popular forms of agent technology is that of programs whose execution can be interrupted on one processor and resumed on another. The authors provide a practitioners' introduction to these programs. Part 1 briefly describes the Internet's potential for conveying running programs as well as static data, outlines potential applications of this technology, and introduces some basic concepts to unify the discussion of individual systems in the remainder of the book. Part 2 covers three systems that do not use Java, and Part 3 covers one system that does. Each of the systems covered is described in a chapter written jointly by the authors of the book and one or more of the developers of that system. The enclosed CD-ROM includes each of the systems, ready for installation on a Unix system. Part 2 offers descriptions of Telescript, written with James White; Agent Tcl, with Robert Gray; and Agents for Remote Access (ARA), with Holger Peine. Part 3 is dedicated to the Aglets system, and was written with the Aglets Workbench team. Java is the language most often associated with mobile agents, and most new systems use it as their foundation. However, the non-Java systems discussed by the authors are more mature and offer more extensive examples of the kinds of agent capabilities that are useful in mobile applications. Software engineers who want to respond to the growing demand for expertise in mobile agents need the kind of help that this book promises. However, this particular volume is less effective than one might desire, for three reasons. First, the field has changed since the authors completed their manuscript. Of the four systems described, only two, Telescript and Aglets, are commercially supported, and thus viable candidates for widespread deployment in commercial applications. General Magic has abandoned Telescript for its new Java-based product, Odyssey. Also, much of the vision for Aglets was due to Danny Lange, who is now part of the Odyssey team. Thus, both of the commercial packages discussed have been bypassed by more recent technology: not only Odyssey, but Concordia, Voyager, Cybele, and Agent Development Environment. A system developer trying to select a platform for mobile agents today will almost certainly prefer information on these platforms. Second, the coverage is uneven. The book devotes 21 pages to Telescript, 38 to Agent Tcl, 79 to ARA, and 128 to Aglets. In spite of their differences in length, the chapters describing the first three systems are similar in tone. They offer systematic expositions of the underlying architecture and key concepts of each system, and work through example applications. The Aglets material lacks the systematic exposition of the architecture. It occupies three chapters. The first guides the reader in installing the Aglets system from the CD-ROM and bringing up a demonstration application. The second lists the Aglets classes and supporting methods, exceptions, and variables. The third is an index of all Aglets fields and methods. While the latter two Aglets chapters are useful, they are very different in kind and level of detail from the information provided about the other systems. Third, the CD-ROM is an excellent idea whose execution is flawed. It contains the complete text of the book in HTML form, and distributions of all four systems described (all for Unix, plus a distribution of Aglets for 32-bit Windows systems). The book promises that the CD-ROM also contains “references to other agent systems which have been developed, agent resources on the Internet, and tips on obtaining software updates that are developed for the included agent systems.” All of these are necessary accompaniments to a book on such a rapidly changing field; unfortunately, none of them is included on the CD-ROM in the review copy. The book also promises that the publisher's Web site will contain URLs for updated software and examples, but to date it does not. The book includes a glossary of more than 50 technical terms related to mobile agents; a bibliography of over 90 items, some published in 1997; and a brief index. While the systems it describes are not the most current candidates for broad commercial deployment, its analysis of them provides a readable introduction to the techniques of mobile agents and the applications for which they may be useful.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.